IRONMESH
v0.8.0 · Pre-1.0

Your agents. Your network.
Your rules.

Zero-config, end-to-end encrypted agent-to-agent communication that never leaves your local network. No cloud. No internet. No compromises.

pip install ironmesh Click to copy

Every agent protocol assumes you're online.

We looked for a way to make AI agents talk to each other on a local network. There was nothing.

Google A2A

× Requires HTTPS and internet. Your agents go silent when the cloud goes down.

Anthropic MCP

× Solves agent-to-tool, not agent-to-agent. IronMesh fills that gap — the two stack together.

ACP

× Local IPC only. Can't cross machines on your LAN.

ANP

× Decentralized but complex DID setup, still assumes internet connectivity.

IronMesh is a layer, not a competitor.

It sits under the agent frameworks and protocols you already use — giving them a transport that survives a router reboot, a dead ISP, or no internet at all.

 ┌─────────────────────────────────────────────────────┐
 │  Your application                                   │
 ├─────────────────────────────────────────────────────┤
 │  Agent frameworks  — LangChain · CrewAI · AutoGen   │  adapters ship with IronMesh
 ├─────────────────────────────────────────────────────┤
 │  Tool / context protocols  — MCP · A2A              │
 ├─────────────────────────────────────────────────────┤
 │  IronMesh — identity · encryption · routing · queue   │  this project
 ├─────────────────────────────────────────────────────┤
 │  Transport  — WebSocket over LAN · Reticulum / LoRa │
 └─────────────────────────────────────────────────────┘
Doesn't MCP already do this?
MCP connects agents to tools. IronMesh connects agents to each other. They compose.
What about LangGraph / CrewAI?
They orchestrate agent logic. IronMesh carries the messages between machines. They compose.
Isn't Tailscale / WireGuard enough?
Those give you an encrypted tunnel. IronMesh adds identity pinning, capability discovery, offline queueing, and an agent-aware routing table on top.
Why not use Reticulum directly?
Reticulum is a great low-level mesh; IronMesh uses it as one of its transports. We add per-agent identity, capability discovery, and an authenticated handshake on top.
0
Cloud dependencies
E2E
Encrypted by default
510
Passing tests
v0.8.0
Current release

If you need the internet to be optional.

For offline-capable, peer-to-peer agent communication specifically, here's how the field looks.

Feature IronMesh Google A2A Anthropic MCP ACP ANP
Works offline / no internetYesNoN/AYesNo
True peer-to-peerYesNoNoNoYes
Zero-config LAN discoveryYesNoNoNoNo
End-to-end encryptionNaClTLS onlyN/ANoYes
Forward secrecyYesDependsN/ANoNo
Multi-hop mesh routingYesNoNoNoNo
Capability discoveryYesNoNoNoNo
LoRa / radio transportYesNoNoNoNo
Self-hosted, no vendor lockYesNoNoNoPartial
Survives internet outageYesNoN/AYesNo

Security isn't a feature. It's the architecture.

NaCl / libsodium crypto — the same library as Signal and WireGuard. Not homebrew. Not "encrypt later." Not "TLS is enough."

🔒

Forward Secrecy

Ephemeral X25519 keys per session, destroyed after handshake. Compromising today's keys can't decrypt yesterday's traffic.

🔍

Zero-Config Discovery

mDNS auto-discovers agents on your LAN. No manual IP config. Identity keys only exchanged during authenticated handshake.

🛡

Mutual Authentication

HMAC-SHA256 passphrase proof. Both client and server prove identity. Ed25519 signatures on every single frame.

🌐

Multi-Hop Mesh

Distance-vector routing with split horizon and poisoned reverse. Messages traverse intermediate peers automatically.

📡

LoRa / Reticulum

Optional transport over LoRa radio at 915 MHz via Reticulum. No internet at all. Just RNode hardware and open spectrum.

Offline Queue

Messages queued in encrypted SQLite when peers are offline. Automatically delivered on reconnect. Priority ordering built in.

The mesh is now a platform.

v0.7.2 closed the production-hardening work. v0.8.0 makes the mesh easy to build on: high-level SDK, framework adapters, multi-mesh federation, a Go reference client, and a runnable Ollama swarm demo.

🤖

Two Ollama agents talking

Ship runnable: examples/ollama_swarm.py. One node runs a local LLM and advertises llm:<model>; another discovers it by name and sends a prompt. No cloud, no API keys. The "multiple AI agents on your home network" demo.

🐍

Agent SDK — 3 lines to join the mesh

High-level Agent class wraps the bridge daemon. Decorator-based message handlers, sync+async send, capability discovery. No asyncio boilerplate, no WebSocket plumbing.

🔗

LangChain · CrewAI · AutoGen

First-party adapters for the three major agent frameworks. create_ironmesh_toolkit(), create_mesh_crew_agent(), register_ironmesh() — drop the mesh into an existing agent stack in one call.

🌐

Multi-mesh federation

FederationGateway bridges two independent meshes with policy-controlled capability forwarding. Each mesh keeps its own trust boundary; allow/deny glob rules control what crosses.

🧪

Go reference client

Full wire-protocol implementation in Go under clients/go/. Frame serialization, X25519 ECDH, XSalsa20-Poly1305, Ed25519 detached sigs, 3-stage handshake. Crypto primitives verified against the Python reference.

🤖

MCP server for agents

Ship an MCP server out of the box. Any MCP-capable agent (Claude Desktop, Claude Code, custom clients) can use IronMesh as a transport for agent-to-agent messaging. Eight tools over stdio JSON-RPC.

📱

Android via Sideband + LXMF

Bundled LXMF gateway bridges IronMesh to the Reticulum LXMF ecosystem. Send from your phone's Sideband app to any IronMesh peer. Verified end-to-end with a real Pixel over LoRa (100% delivery at SF8/BW125, 1.07–1.98 s RTT).

The handshake.

Mutual passphrase auth, signed ephemeral ECDH, channel binding. Three stages. Zero trust assumptions.

Client                                   Server
  |                                        |
  |<── PASSPHRASE_CHALLENGE ──────────────| (32-byte server nonce)
  |─── HMAC-SHA256(pass, nonce) ─────────>|
  |<── PASSPHRASE_VERIFIED + server_proof─| (mutual auth)
  |    verify server_proof                 |
  |                                        |
  |─── HELLO (eph_pub_A, id_pub_A) ──────>| signed(Ed25519) + channel_binding
  |<── HELLO (eph_pub_B, id_pub_B) ───────| signed(Ed25519) + channel_binding
  |    TOFU check on id_pub_B             | TOFU check on id_pub_A
  |                                        |
  | ECDH(eph_priv_A, eph_pub_B)           | ECDH(eph_priv_B, eph_pub_A)
  |    = shared_secret                     |    = shared_secret
  |  (ephemeral privkeys destroyed)        | (ephemeral privkeys destroyed)
  |                                        |
  |<═══ Encrypted + Signed Messages ═════>| SecretBox + Ed25519 on every message

Built for people who don't trust the cloud.

Home AI Mesh

Raspberry Pi running Ollama talks to your desktop coding agent. No cloud. No API keys. No third parties.

Off-Grid Comms

Agents on a network with no internet coordinate tasks, share data, and run workflows over LoRa radio.

Prepper Infrastructure

Self-contained AI network that works when the internet doesn't. Solar-powered Pi cluster. Local models.

Air-Gapped Labs

Agents in isolated environments that can never touch the internet. Full encryption at rest and in transit.

Privacy-First AI

All agent communication stays on your LAN. Nothing leaves your network. Nothing gets logged by anyone.

Multi-Device Workflows

Phone, desktop, and server agents all talk directly to each other. mDNS discovery. Zero config.

Pull the plug on your router.
IronMesh keeps working.

Local-first. Offline-capable. Mesh-ready. Zero-config. No cloud required. Ever.

pip install ironmesh Click to copy